Quantum State Manipulation of Single-Photon Wave Packets

Author(s):  
Laura J. Wright ◽  
Michał Karpiński ◽  
Brian J. Smith
1999 ◽  
Vol 59 (3) ◽  
pp. 2163-2173 ◽  
Author(s):  
I. Sh. Averbukh ◽  
M. Shapiro ◽  
C. Leichtle ◽  
W. P. Schleich
Keyword(s):  

2017 ◽  
Vol 119 (6) ◽  
Author(s):  
Yu He ◽  
Yu-Ming He ◽  
Yu-Jia Wei ◽  
Xiao Jiang ◽  
Kai Chen ◽  
...  

2021 ◽  
Author(s):  
Yunru Fan ◽  
Chenzhi yuan ◽  
Ruiming Zhang ◽  
Si Shen ◽  
Peng Wu ◽  
...  
Keyword(s):  

2020 ◽  
Vol 49 (2) ◽  
pp. 205002
Author(s):  
王志远 Wang Zhiyuan ◽  
张子静 Zhang Zijing ◽  
赵 远 Zhao Yuan

2011 ◽  
Vol 84 (5) ◽  
Author(s):  
Jovica Stanojevic ◽  
Valentina Parigi ◽  
Erwan Bimbard ◽  
Rosa Tualle-Brouri ◽  
Alexei Ourjoumtsev ◽  
...  
Keyword(s):  

2012 ◽  
Vol 10 (01) ◽  
pp. 1250001 ◽  
Author(s):  
BORIS ŠKORIĆ

Physical unclonable functions (PUFs) are physical structures that are hard to clone and have a unique challenge-response behavior. The term PUF was coined by Pappu et al. in 2001. That work triggered a lot of interest, and since then a substantial number of papers has been written about the use of a wide variety of physical structures for different security purposes such as identification, authentication, read-proof key storage, key distribution, tamper evidence, anti-counterfeiting, software-to-hardware binding and trusted computing. In this paper we propose a new security primitive: the quantum-readout PUF (QR-PUF). This is a classical PUF, without internal quantum degrees of freedom, which is challenged using a quantum state, e.g. a single-photon state, and whose response is also a quantum state. By the no-cloning property of unknown quantum states, attackers cannot intercept challenges or responses without noticeably disturbing the readout process. Thus, a verifier who sends quantum states as challenges and receives the correct quantum states back can be certain that he is probing a specific QR-PUF without disturbances, even if the QR-PUF is far away "in the field" and under hostile control. For PUFs whose information content is not exceedingly large, all currently known PUF-based authentication and anti-counterfeiting schemes require trusted readout devices in the field. Our quantum readout scheme has no such requirement. Furthermore, we show how the QR-PUF authentication scheme can be interwoven with quantum key exchange (QKE), leading to an authenticated QKE protocol between two parties. This protocol has the special property that it requires no a priori secret shared by the two parties, and that the quantum channel is the authenticated channel, allowing for an unauthenticated classical channel. We provide security proofs for a limited class of attacks. The proofs depend on the physical unclonability of PUFs and on the practical infeasibility of building a quantum computer.


2019 ◽  
Vol 27 (3) ◽  
pp. 3113 ◽  
Author(s):  
Martin Bouillard ◽  
Guillaume Boucher ◽  
Júlia Ferrer Ortas ◽  
Bhaskar Kanseri ◽  
Rosa Tualle-Brouri

Sign in / Sign up

Export Citation Format

Share Document